First published: Fri May 03 2002(Updated: )
PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.0.28-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0240 has a medium severity rating due to the potential for exposure of sensitive server path information.
To fix CVE-2002-0240, configure the Apache server to restrict the HTTP OPTIONS method and ensure proper error handling.
CVE-2002-0240 specifically affects Apache HTTP Server version 2.0.28-beta when installed with PHP.
Yes, the exposure of the full pathname may assist attackers in crafting targeted exploits against the server.
CVE-2002-0240 was disclosed in 2002, highlighting a vulnerability in Apache's handling of HTTP OPTIONS requests.